Encryption challenges in the Cloud
Develop a use case for the application of cryptosystems to solve specific challenges. 1. Your paper should describe in detail the cryptographic system used (substitution and/or permutation), or the use of block ciphers and their encryption modes to provide the most adequate security properties. 2. How does the technology address “indistinguishability under chosen-plaintext attack …